Hack into Any WIFI network
This Practical is For Educational Purpose only.
Here I am Attacking on my Wifi network so I am not responsible for any Harm you made using this Practical !
There are some requirements to complete this Practical Successfully.
Requirements :-
1. 2 Wifi adapters that support packet injection and monitor mode.
2. Kali linux OS
3. Wifi of a Victim
If you don’t have wifi adapter then watch this blog -https://jayrajsblog.blogspot.com/2022/02/budget-wifi-adapters-to-start-your.html
Now let’s start the practical — —
Before starting kindly attach both the adapters to your system and then reboot it after connecting.
Step 1 — Clone this repo. at desktop
Command — git clone https://github.com/FluxionNetwork/fluxion.git
Step 2 — Move to Fluxion directory
Command — cd fluxion
Step 3 — Fluxion needs some dependencies to work properly so we had to install it.
Command — sudo ./fluxion.sh -i
Step 4 — Select english language by typing 5 and then press enter.
Step 5 — We will select Handshake snooper to get the password(hashed) of the victim.
Step 6 — Select any of your adapter for target Searching.
Step 7 — Select 3 for searching both 2 and 5 GHZ channels.
Step 8 — Press Ctrl+c when you see your victim SSID(wifi name) here.
We are going to target D@nny here(It’s my Wifi)
Step 9 — Press 8 to select victim
Step 10 — Select any one wifi adapter from list.
Step 11 — Select airplay-ng deauthentication method.
Step 11 — select any one adapter for monitoring and jamming the network.
Step 12 — select cowpatty verification
Step 13 — Select 30 second(option 1)
Step 14 — Select option 2
Step 15 — It will start to send deauth packets to the wifi and trying to capture.
Step 16 — Wait until this attack completed message appears.
Step 17 — Select another attack by pressing 1.
Step 18 — Now select captive portal attack.
Step 19 — now select 1
Step 20 — now select a device for target tracking.
Step 21 — Now select the same adapter that you select in above step.
Step 22 — Now select the different adapter then above because this attack needs two adapter for attacking.
One adapter for de authentication attack.
And second adapter for Creating a Fake access point like victim.
Step 23 — now select mdk3
Step 24 — Now select option 1 which is recommended
Step 25 — now select cow patty(bcoz we have hash captured in cowpatty verification method so to deauthenticate it we need this).
Step 26 — select 1 as we have captured the hash and it is stored in file in our system.
Step 27 — select 2nd option.
Step 28 — Now we are towards creating the fake access point. Select 1
Step 29 — to keep disconnected while Fake access point is on type 1
Step 30 — As we guess the router or by can physically verify the router manufacter to create the Fake login page.(Mine was TPlink)
Step 31 — Now the Fake firmware page was shown on the device.
Step 32 — As soon as victim enters the password the page disappers and the victim will be automatically connected to the original wifi he belongs.
Step 33 — Now you will se this type of message on kali.
Step 34 — To see the password of Victim, Locate to the directory shown in Screenshot.
So. the practical ends here !!!
JAYRAJSINH CHAUHAN